|
|
|
|
Web 2.0 Security - Defending AJAX, RIA, AND SOAService-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security... | | Google Hacking for Penetration TestersGoogle Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious... | | The Ethical Hack: A Framework for Business Value Penetration TestingThis book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required... |
|
|
| | Renewable Energy (Energy Science and Engineering)The present edition has been updated in a number of renewable energy technology areas (Chapter 4 and 5), where progress have been made over the recent years. New solar simulation studies have been added to Chapter 6, and market considerations have been included in the overview in Chapter 1, and in discussing industry liberalisation in Chapter 7.... | | Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer)Get hands-on, expert guidance for developing more secure Web applications with ASP.NET 2.0 with this in-depth reference. The nature of the Web and its underlying communication protocols make Web applications harder to secure and, therefore, primary targets for hacking attacks and other kinds of compromises. This book guides you through the possible... |
|
Worldwide Wi-Fi: Technological Trends and Business StrategiesYour success guide to the next wireless revolution
The next watershed innovation in wireless technology is here: IEEE 802.11 wireless local area networks (LANs).
Recent studies from IDC indicate that the Wi-Fi wireless LAN market will likely account for ninety percent of projected LAN equipment revenues by... | | CCNA Exam Cram (Exam 640-802) (3rd Edition)“The CCNA exam is difficult and I would not have passed it if I did not have this book with me. The CCNA Exam Cram is an indispensable resource that guided me from the introduction of networking fundamentals to the application of networking theories. Whether you need to learn from scratch or just need a quick reference, this book is an... | | Security+ Guide to Network Security Fundamentals
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly preparing readers for the CompTIA Security+ SY0-301 certification exam. Its comprehensive introduction to practical network and computer... |
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |